Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33658: CWE-770: Allocation of Resources Without Limits or Throttling in rails activestorage

0
Low
VulnerabilityCVE-2026-33658cvecve-2026-33658cwe-770
Published: Thu Mar 26 2026 (03/26/2026, 21:03:25 UTC)
Source: CVE Database V5
Vendor/Project: rails
Product: activestorage

Description

CVE-2026-33658 is a low-severity denial-of-service vulnerability in the Active Storage component of Ruby on Rails prior to versions 8. 1. 2. 1, 8. 0. 4. 1, and 7. 2. 3. 1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 21:47:39 UTC

Technical Analysis

CVE-2026-33658 is a resource exhaustion vulnerability classified under CWE-770, affecting the Active Storage proxy controller in Ruby on Rails versions prior to 8.1.2.1, 8.0.4.1, and 7.2.3.1. Active Storage facilitates attaching cloud and local files in Rails applications. The vulnerability stems from the lack of limits on the number of byte ranges accepted in the HTTP Range header. HTTP Range headers allow clients to request specific portions of a file, typically to resume interrupted downloads or stream media. However, the proxy controller does not throttle or restrict the number of these byte ranges, enabling an attacker to send a request with thousands of small ranges. Processing these numerous ranges consumes excessive CPU resources disproportionately compared to normal requests, leading to potential denial-of-service (DoS) conditions by exhausting server processing capacity. The vulnerability requires the attacker to have at least low privileges (PR:L) but does not require user interaction or authentication beyond that. The CVSS 4.0 base score is 2.3, reflecting low severity due to limited impact scope and exploitation complexity. No known exploits have been reported in the wild. The issue is addressed in Rails versions 8.1.2.1, 8.0.4.1, and 7.2.3.1 by implementing limits or throttling on the number of byte ranges processed in the HTTP Range header, thereby preventing resource exhaustion.

Potential Impact

The primary impact of this vulnerability is a denial-of-service condition caused by excessive CPU consumption when processing maliciously crafted HTTP Range headers with numerous byte ranges. For organizations running vulnerable versions of Rails with Active Storage enabled, this can lead to degraded application performance or complete service outages, affecting availability. This may disrupt business operations, especially for web applications relying on file attachments or streaming features. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact can be significant in high-traffic environments or where resource constraints exist. Exploitation requires sending specially crafted HTTP requests, which can be automated and scaled, potentially allowing attackers to disrupt services remotely without authentication. However, the low CVSS score and absence of known exploits suggest limited immediate risk. Organizations with public-facing Rails applications using affected versions should consider the risk in the context of their exposure and threat landscape.

Mitigation Recommendations

Organizations should upgrade to the patched Rails versions 8.1.2.1, 8.0.4.1, or 7.2.3.1 as soon as possible to eliminate this vulnerability. If immediate upgrading is not feasible, implement web application firewall (WAF) rules to detect and block HTTP requests containing an excessive number of byte ranges in the Range header. Rate limiting and request size restrictions can also help mitigate potential abuse. Monitoring server CPU usage and HTTP request patterns for anomalies related to Range headers can provide early detection of exploitation attempts. Developers should review custom Active Storage proxy controller implementations to ensure they enforce limits on Range header processing. Additionally, consider isolating or load balancing critical services to reduce the impact of potential DoS attacks. Regularly audit and update dependencies to maintain security posture.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-23T15:23:42.219Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c5a54b3c064ed76fcfc821

Added to database: 3/26/2026, 9:29:47 PM

Last enriched: 3/26/2026, 9:47:39 PM

Last updated: 3/27/2026, 5:26:17 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses